ICT infrastructure in libraries

Many studies have been conducted regarding the use of ICT in libraries. For instance in India, Sampath Kumar & Biradar (2010) observe the use of information communication technology (ICT) in 31 college libraries in Karnataka, India by analyzing the ICT infrastructure, status of library automation, barriers to implementation of library automation and librarians’ attitudes towards … Read more

Huawei Technologies Co., Ltd.

Huawei Technologies Co., Ltd. (hereafter; Huawei) is a Chinese multinational provider of information and communications technology solutions that is headquartered in Shenzhen, Guangdong. At its early stages, Huawei only focused on manufacturing phone switches but has now expanded to building telecommunication network and also designing smart phones for the consumer market around the world. This … Read more

Net Neutrality

Net Neutrality is the principle that every point on the network can connect to any other point on the network, without discrimination on the basis of origin, destination or type of data. This principle is the central reason for the success of the Internet. Net Neutrality is crucial for innovation, competition and for the free … Read more

Operating systems

Introduction At the most fundamental level, an operating system serves as an intermediary—that is, a middleman—between a computer user and computer hardware (Bower, 2015). It is an extensive and complicated group of system programs that oversees the many operations of a computer and handles the management of computer resources (Garrido, Schlesinger, & Hoganson, 2013). Furthermore, … Read more

Quantum resistivity of cryptography

This paper investigates the Quantum resistivity of cryptography and provides an understanding towards building a cryptosystem that can survive cryptanalytic attacks carried out using quantum computers; such attacks are called quantum attacks. Quantum resistivity of cryptography refers to the ability of cryptosystems on which cryptanalytic attacks using a quantum computer cannot be performed. Both symmetric … Read more

Social Media in Crisis: A Literature review

Recent technological advancements has made technology (devices, internet and information) available to a large population across the globe. In this literature review, we will investigate the relevance of social media during crisis. In particular, we will look at how existing technologies are being exploited by various stakeholders (victims, NGOs, government etc.) to navigate, gather information, … Read more

Internet memes

Paste your essay in here…The coming of web-based social networking has brought internet memes, an extraordinary social sensation, to the front phase of the Web. Memes can broadly be considered social or cultural ideas or symbols that are virally transmitted via the Internet. Memes are normally jokes, urban legends, viral recordings, funny pictures or infectious … Read more

Mobile Ad Hoc Network (MANET)

Abstract: Mobile Ad Hoc Network (MANET) is a dynamic, infrastructureless, Self Configuring network. Due to its natural characteristics, a MANET is vulnerable to many security threats. Blackhole attack is one of such attacks, that attempts to degrade the performance and reliability of the network. Since nodes are allowed to move freely within the network, it … Read more

Social networks analysis

In recent years, there has been growing interest in social networks analysis. Methods and technical tools have significantly developed and became more available to users (borgatti et al, 2009 ), which allow researchers to analyze relations between persons, groups and organizations (Carrington and al, 2005 ). There has also been increasing interest in people’s mobility … Read more

ELECTRONIC PAYMENT SYSTEMS

INTRODUCTION 1. ABOUT ELECTRONIC PAYMENT SYSTEM Ecommerce payment system provides electronic payment system for all online transactions. The use of electronic payment has been increased especially for online based shopping and banking transactions. Credit card have become more common form of payments for e commerce transaction from few years. In developed countries 90% of transactions … Read more

SECURITY ATTACKS AND SOLUTIONS IN VEHICULAR AD HOC NETWORKS

A SURVEY ABSTRACT Vehicular Ad Hoc Network (VANET) is a sub class of mobile ad hoc networks. VANET provides wireless communication among vehicles and vehicle to road side equipment’s. The communication between vehicles is used for safety, proficiency and other added services. However, VANETs are themselves defenseless against attacks that can directly lead to the … Read more

Character recognition

INTRODUCTION 1.1 Background to the Study A character is the basic building block of any language that is used to build different structure of the language (Iorundu and Esiefarinrhe, 2015). Characters are the alphabets and the structures are the words, strings and sentences (Lecun et al., 1990), (Kader & Deb, 2012). Recognizing characters with diacritical … Read more

iOS devices in healthcare

Apple devices have seen an increased presence in the workplace. Industries such as construction, retail, finance, education, and others have brought iOS to the workplace. Apple’s operating software is being implemented for a variety of reasons, including (but not limited to) security and durability, and the overall user-friendly software. Like many industries, healthcare has introduced … Read more

Big data

Tim McGuire, an Ivey Business Journal reporter in his work “Why Big Data is the new competitive advantage”, defines the use of big data as “large pools of data that can be brought together and analyzed to discern patterns and make better decisions (par. 1). He argues that adoption of data collection techniques will become … Read more